11 Apr The right partner is crucial to riding the technology wave

Technology continues to evolve apace. Choosing the right technology partner is vital to business success in an increasingly interconnected world.

There can be no doubt that technology is evolving rapidly and that companies today need to partner with the right organisation if they want to ride the wave of technology development. A good example of this evolution is the manner in which the cloud has led to the shift from hosting most infrastructure on-premises to keeping everything in the cloud.

This shift has led to new providers arising and bringing new cloud services to the table, suggests Wayne D’Sa, CEO of CipherWave Business Solutions. He notes that the COVID-19 pandemic demonstrated the value of the cloud, as it enabled organisations to switch to remote working, while those working on a cure were able to use the cloud to process vast amounts of data rapidly.

“The cloud makes it much easier to process large data subsets, as you are not hindered by the obvious limitations of on-premises processing capacity, and this in turn means results can be delivered quickly in order to enable rapid business decisions to be taken,” he says.

“Of course, while the major public cloud players have massive infrastructure and a global footprint, organisations that do not have the relevant expertise or understanding of the cloud to achieve their goals cannot simply call an Amazon or Microsoft directly. This has opened up a space for niche cloud providers to step in and fill this gap for customers – either on the back of the public cloud, or by using their own private cloud to deliver the flexibility the customer needs.”

He adds that the cloud itself is composed essentially of data, and in a digitising world, such data is increasing exponentially. Therefore, he says, security is equally critical and needs to be designed to suit the cloud environment. D’Sa suggests that, just as a person withdrawing money from a bank would need to verify who they were by showing identification, the same occurs with the cloud.

“It is vital to validate the individual seeking access to the data to ensure they are who they say they are. We always recommend utilising a zero trust framework, which only allows a user access to the minimum data their position requires them to see. In this way, it becomes possible to re-engineer your security processes to achieve a better outcome with regard to protecting your data.”

Another example, he points out, where technology has advanced significantly in recent years, is in how fast the fibre landscape has grown. As the country has shaken off the telco monopoly of the past, so a host of new providers have been investing in fibre roll-out, he says, creating new and better connectivity options for customers.

“We understand the need to part of this quantum growth, which is why we have ensured our organisation is connected to every fibre provider, enabling us to service our customers, regardless of whether the provider delivers fibre to the business (FTTB) or fibre to the home (FTTH),” states D’Sa.

“In much the same way, we are now witnessing the rise of 5G, which will be especially effective in providing a better on-the-go experience. This is of enormous benefit to the gig economy, which is driven mostly by mobile connectivity. The right partner here will be one that works closely with the mobile providers to offer fixed-line access to these services for their remote workforce.”

This ties in nicely with the concept of unified communications (UC), he adds, explaining that UC is a result of how interconnected these various technologies are becoming. “UC offers a rounded experience that takes telephony, traditional text and e-mail communications, bundles these together and uses best-of-breed solutions to deliver this all in a single offering that provides a seamless experience.”

Most businesses simply cannot find the time to learn about and understand the new technologies that are coming to the fore, which means they don’t always realise the true benefits. Organisations need to be open to testing new technologies, which means creating an environment that can enable this.

“It is for this reason we say that they need to ensure that their technology provider of choice is aligned to their planned journey and the goals they seek to achieve. So when choosing your provider, it is necessary to clearly understand exactly what technologies they are experts in, and how integrated they are into other vendors and providers. Such integration is critical if you are to achieve a truly seamless experience.”

“Ultimately, it’s about evolving your business in a way that allows you to better service your end customers. Your technology partner will play a crucial role in ensuring you have the ability to utilise all the technologies mentioned above to improve your business efficiency and deliver exceptional customer service,” he concludes.

 

Courtesy of ITWeb


Johannesburg, 11 Apr 2022

09 Feb Cloud security: it’s about choosing the right provider

When moving to the cloud, it is imperative not to base your choice of provider on price alone, but rather on their knowledge, experience and access to best-of-breed technologies.

It is clear that in today’s digital world, everyone’s data footprint is growing at a substantial rate, whether this is from a work perspective or an individual’s consumer footprint.

As this growth is exponential, it becomes increasingly difficult to keep up with this rate of growth. This has led to the shift from storing data on-premises to keeping it in the cloud. Although this has enabled greater storage capacity, it has also provided us with the ability to consume even more services.

According to Wayne D’sa, CEO at CipherWave Business Solutions, the more services we consume, the more devices and technologies we utilise to facilitate that consumption, the more security challenges this creates.

“Security is ultimately about managing risk. It is about understanding what is considered an acceptable level of risk and about knowing what to protect, how to protect it, who has access to it and what parameters are in place to warn you if anyone without access is attempting to do so anyway,” he says.

“Of course, the principles of security are the same whether you are a business or a consumer. Often the protection utilised is the same, it is simply the parameters that differ. For example, a consumer using a solution like Dropbox may use a simple password and PIN mechanism (called two-factor authentication) for security. On the other hand, a business using the same solution may require a domain authentication before asking for a similar two-factor authentication, and may then even need a rights access management authentication.”

He suggests that in a cloud context, decision-makers need to understand that when placing data and applications into the cloud, it is imperative to understand exactly what security protections the cloud provider offers. Following this, they should look at things from an applications perspective and understand what security the application provides.

“Finally, considering that the majority of breaches occur from internal sources, it is about clearly understanding what access your end-users have, because it is easy for an employee who is simply not educated enough in the ways of security to accidentally compromise your business.

“It is thus critical to choose a service provider that ensures the infrastructure protection provided matches the security requirements of whatever apps or data are being placed in the cloud. They should also have mechanisms in place to protect the perimeter and be in a position to recommend solutions – such as anti-virus software – that can help the client protect their apps.”

The service provider must be willing to determine what the customers’ needs are and what their risk appetite is with regard to security. Essentially, he adds, the service provider’s approach to security should begin with a zero trust strategy and build from there.

“It is the responsibility of every business decision-maker to clearly understand their cloud provider of choice, what service offering they can provide and what security solutions and technologies they leverage to ensure the safety of the company’s data and applications,” continues D’sa.

“This is absolutely critical, because far too often, businesses’ first priority in such discussions is price. Thus, they seek out a cloud provider that meets this requirement and simply shift the responsibility of protecting their data onto the provider – but the reality is that in the end, it is the decision-makers who are responsible for understanding the providers’ security provided for their applications.”

He advises companies to create their own checklist of security principles, practices and solutions in order to clearly understand how these protect the organisation’s data. The checklist should include clarity on issues such as how often do they upgrade their infrastructure, which providers are they aligned to and are they using best-of-breed technologies, and how – should they choose to change providers – are they able to safely move their data over, and whether they will get this data back in a format that is usable.

“We have certainly seen many businesses that don’t fully understand what a digital journey truly means, and there are lot of service providers that offer promises that don’t always meet expectations. Ultimately, if you are choosing a cloud provider, you need to accept your responsibility in the decision and not abrogate it.

“From a security perspective, especially, there are so many risks that it is vital to do your homework – and the key is to ensure your service provider is established, aligned to best-of-breed technologies and able to advise and assist you with regard to the correct security measures to take and solutions to implement,” concludes D’sa.

 

Courtesy of ITWeb


Johannesburg, 09 Feb 2022

02 Dec Meet the team taking CipherWave to new heights

In this episode of the podcast, we meet the executive team of South African Internet service provider CipherWave.

The podcast explores the company’s solutions and how it works with customers, as well as its plans for 2022, including empowering customers in a self-service environment.

Led by CEO Wayne D’SA, CipherWave has a young executive team who are making waves in the local ICT industry.

Watch the video

 

 

Courtesy of TechCentral

2 December 2021

19 Nov From the ground up

How has the pandemic impacted cloud adoption in South Africa?

“Prior to the pandemic, cloud was one of the technology spheres that companies were looking at and saying: In the future, we want to get there but not right now. But when COVID-19 hit, they needed to adjust their operational practices of how work would carry on,” explains Wayne D’Sa, CipherWave’s CEO.

For many, business continuity meant keeping a newly dispersed workforce connected. The restrictions imposed by the pandemic showed that relying on office infrastructure would no longer work and cloud computing became a necessity.

“The past 18 months has done well for the awareness capability of cloud. For nearly every industry there was this ‘aha’ moment when it came to digital migration and what it actually means,” says D’Sa. “There are also limitations around keeping infrastructure in an office where you need bandwidth to support growth. If your bandwidth isn’t sufficient, productivity is affected.”

According to D’Sa, companies are now readjusting their cloud strategy. While many organisations saw cloud as a tool for business continuity during the pandemic, rushing into ‘work from anywhere’ migratory solutions, the market has now taken a more fit for purpose view with one of the main focus areas of cloud adoption being security – keeping employee and company data safe.

“Security is critical. In a reliable provider environment, you know what you’re getting for that service, whereas if it is managed in-house, the question sits with your own team,” he says. When it comes to data security and user privacy, D’Sa suggests adopting a cloud solution that is trustworthy, controllable and compliant. While cloud in itself, as an infrastructure, is considered secure, reliable providers will offer an end-to-end security solution that includes dedicated firewall protection, virtual server protection and encryption.

Another consideration is usage. While public clouds do offer consumption-based models, not understanding your company’s consumption could be problematic. D’Sa explains that most businesses do not understand how much data they bring in, or data they process.

“If you’re very much aware of what you’re consuming and how you’re consuming, it won’t be a problem because then the costs are predictable. But there are many complexities – we’ve seen businesses moving away from public cloud into private cloud purely because of unpredictable costing,” adds D’Sa.

While a general-purpose, traditional cloud solution could work, D’Sa believes that a cloud strategy that’s fit for purpose and assures optimal business value is one of the biggest lessons to come out of the past 12 months. Cloud is now seen through a different lens.

“People are looking and saying: Do we need all of our workloads there? How do we adjust them or move them back into a private cloud because the costs are more stable? What does our data housing look like? The pandemic has spearheaded a more focused approach towards what’s happening in the cloud,” says D’Sa. “The focus of pre-pandemic cloud adoption was low-level apps like e-mail and backups. During the pandemic, the key factors were scalability, manageability and availability, and now we’re seeing the market coming back in terms of sales performance and productivity.”

Even though vaccination numbers are rising and infection rates are coming down, the pandemic is far from over. For many organisations, it’s no longer about coming out the other side, but rather continuing through “because there isn’t an end date”, adds D’Sa. “With sales performance and productivity picking up, companies are having to scale to meet demand. They’re putting more into cloud, whether it’s private or public. Many are taking a hybrid approach and starting to put more of their data into cloud environments because the flexibility is there.”

In order to remain competitive, companies now need to decide what applications and data can be placed in the cloud in order to build future scalability. What’s more is that partnering with cloud entities that can provide access to infrastructure is what will minimise business risk.

“Companies are making a massive, concerted effort to have a footprint in a cloud. Hybrid cloud is going to be where we will probably stay for a while because it is a fit-for-business discussion. Decisions are being made from a risk perspective,” explains D’Sa. “What we will see is companies adopting larger percentages of their production environments in a cloud of sorts.”

With so many cloud providers to choose between, D’Sa advises those who are about to embark on a post-pandemic, digital migration – or readjustment – to take the time and effort required to ensure they pick the right cloud partner. It’s not simply about selling a virtual server but rather understanding what that service can do for the customer and how it will impact their business.

“Find out where they are in the cloud space at the moment. What are they developing going into the future? What does their support look like? It’s important that their technology framework is aligned to how your organisation or industry works,” he says. “The reality is that any company that does not have cloud already on the roadmap is not one that will exist.”

 

Courtesy of ITWeb


Johannesburg, 19 Nov 2021

20 Sep Wayne D’Sa on a new era for CipherWave

Wayne D’Sa is CEO of connectivity provider CipherWave. In this episode of the podcast, he unpacks his plans for the business, including its strong play into the voice space.

The company has strong offerings as an Internet service provider, cloud provider and voice partner.

In the podcast, D’Sa explores how CipherWave develops and retains talent, with an emphasis on promoting from within, thereby creating a culture of excellence in the organisation.

D’Sa goes into detail regarding CipherWave’s strategy, structure and service and why he believes the company is different.

As a CEO, D’SA shares his philosophy and how he leads from the front. His technical experience has impacted on his executive leadership style, he says.

Enjoy the discussion!

Watch the video

 

 

Courtesy of TechCentral

20 September 2021

04 Jun Connect with your customers. Collaborate with your teams. Continue to grow your business.

Change is the only constant and the new normal is taking some getting used to. In the past couple of months, we have had to change the way we do business, how we support customers and how we interact with our teams. During level 5 of lockdown most people were working from home. Since moving to level 4 many businesses have adopted a hybrid work strategy where some staff are at the office, some are mobile, and others are remote. The key is to ensure that your business can continue to support your customers

A hybrid work strategy presents its own unique set of challenges in order to maintain excellent customer service and to maintain your business’ data security.

CipherWave offers a comprehensive range of Cloud and Voice solutions that will help ensure your transition is a smooth one. Our work from home essentials includes Email, Email Archiving, Cloud Backups, Cloud Disaster Recovery, Virtual Servers, Cloud PBX, Microsoft Teams Calling and CipherWave’s SIP Trunk.

With face-to-face meetings remaining lesser of an option, emails, calls and virtual meetings have become a necessity when communicating with customers and staff members. Our email collaboration suite includes Hosted Exchange and Microsoft 365 packages which includes the complete Office suite as well as Microsoft Teams. CipherWave, an official Mimecast partner, also offers a unified email management solution which includes Email Security, Email Continuity and Email Archiving via a single integrated web-based central administration console.

Business Continuity forms part of our Cloud offering and includes Backups and Disaster Recovery. Our Cloud Backup solution incorporates Veeam software with secure encryption to seamlessly protect our customers’ backup data. Hosting locally ensures faster backup and recovery timeframes. Our Cloud Disaster Recovery solution provides customers with a secure encrypted environment to backup and recover critical data and business applications at a cost-effective price. With CipherWave’s Disaster Recovery you are ultimately able to reduce the amount of downtime hours and in turn protect your business from any adverse impact.

CipherWave’s Virtual Server solutions offer customers the flexibility to either transact within a managed Private Cloud environment or within our Public Cloud offering backed by our robust infrastructure topology. CipherWave’s Cloud services are best known for our undeniable Service Level Agreements and unbeatable quality of service over the past 10 years.

CipherWave’s Cloud PABX technology offers our customers a true alternative to any legacy on-premise PABX telephony system. Our Cloud Hosted PBX integrates with leading IP handsets and boasts a plethora of features including IVR, line hunting, call waiting, voice mail and music on hold. Our Hosted PBX coupled with gloCOM, a feature-rich desktop and mobile unified communications application, allows you to take your office with you wherever you go, by seamlessly extending your office extension onto your mobile device. Scalability of our platform enables us to provide a unified Telephone Management System (TMS) and Call Recording stack to our customers from an expense and continuity measure.

Microsoft Teams has become one of the most stable voice and video messaging mediums which can be integrated into your Microsoft 365 licensing through CipherWave. Microsoft Teams allows you to safely and securely hold multi-party video conference meetings with internal teams members as well as customers utilizing Teams from any mobile device and also has the ability to make and receive calls through our voice platform by subscribing to Microsoft Teams Calling with us. 

Cybercrime has increased during this lockdown period as more and more people heavily rely on the Internet when working remotely. Cybercriminals aren’t reinventing the wheel but rather making a few innovative adjustments to their current malicious toolbox when attempting to penetrate your private network. Phishing emails have been designed to look like emails from official sources, government bodies and financial institutions. Cybercriminals are also defrauding people of their money by posing as legitimate charities requesting donations. The best way to protect your business data is by preventing the phishing emails from reaching users by employing anti-spam and anti-virus software within your network which scans all incoming emails to detect and block threats whilst preventing malicious or unintentional loss of sensitive or confidential information. Managed firewalls, user education and ensuring all systems are updated also form a large part of an effective security strategy for your business. CipherWave is able to assist you in evaluating and executing compliant security measures in protecting your network and network users.  

CipherWave is a South African Internet Service Provider (ISP) that provides growing businesses with a range of solutions to help them connect, communicate and collaborate with their customers, employees and suppliers. We own and manage our own network infrastructure, which enables us to provide efficient, speedy service and support that our customers can count on 24/7.

26 Nov Cybersecurity – Protecting your business in today’s digital world



Cybersecurity refers to the practise and action taken in order to protect user computers, networks, programs and data from unauthorised access within a business.

Businesses have historically taken an extremely reactive approach in fighting cyberthreats and cyberattacks by relying on individual security technologies to protect their most valuable assets being their intellectual and proprietary company data.

This method has over recent years resulted in stories of devastating breaches impacting loss of revenue, loss of confidential company data and overall loss of business credibility.

Some of the more commonly known cyberattacks are:

Denial-of-Service (DoS): Denial-of-Service attack occurs when multiple systems flood the bandwidth or resources of a targeted system, usually one or more web servers. Such an attack is often the result of multiple compromised systems flooding the targeted system with traffic which could include malicious software infecting the network.

Malware: A malware attack is a type of cyberattack in which malicious software performs activities on the victim’s computer system. Malicious software can be described as unwanted software that is installed in your system without your consent. It can attach itself to legitimate code and propagate.

Phishing: A phishing attack attempts to send emails that appear to be from trusted senders with the aim of gaining your personal data and information. Sometimes phishing attacks surface as a link to an illegitimate website, which often tricks the user into downloading malware or disclosing personal information.

Eavesdropping: Eavesdropping is an unauthorised digital communication, real-time interception of a private communication, such as phone calls, instant messages or video conferences. An eavesdropping attack, also known as snooping or sniffing, is a network security attack whereby an individual attempts to steal the information that smartphones, computers and other digital devices send or receive.

What should we do in order to best protect our business in today’s digital world?

CipherWave and Securicom have partnered with the intention to help protect your business from the inevitable world of cybercrime by offering pro-active network, email and endpoint security solutions all designed as a managed service to compliment your current security technologies suite.

Being rapidly growing leaders within their respective verticals both service providers have identified the need to upskill and empower businesses around the threats of trading within a digital world which sometimes has a dark underbelly.

CipherWave offers a uniquely safe and secure cloud environment with the option of dedicated managed FortiGate firewall protection or unified virtual server protection when hosting within their owned and managed Midrand data centre facility. 

In creating a security-focused workplace, CipherWave is able to supply an end-to-end security solution encompassing firewalls, email anti-virus and anti-spam, server anti-virus and endpoint protection solutions not just for office-based users, but for remote workforces who still require access to the office network.

Measures to mitigate cyberattacks may vary, but security basics should remain the same. We recommend the following best practises to help improve your business’s security competency:

  • Continuously review and update your systems and anti-virus databases, 
  • Embrace employee security awareness programmes, 
  • Insist that your service provider configures your firewall to whitelist only the specific ports and hosts which you need, 
  • Ensure that you keep your passwords strong, 
  • Adopt a regular cloud backup strategy with a reputable cloud service provider, and 
  • Continuously conduct IT security audits in search of suspicious activity.
CipherWave is a South African Internet Service Provider (ISP) that provides growing businesses with a range of solutions to help them connect, communicate and collaborate with their customers, employees and suppliers. We own and manage our own network infrastructure, which enables us to provide efficient, speedy service and support that our customers can count on 24/7.

16 Sep Visit the CipherWave Stand at the MyBroadband Conference to Experience the Excitement of the Internet



CipherWave and Home-Connect will be returning to the MyBroadband Conference & Expo this year as Gold Sponsors.

CipherWave, a local leading Business Internet Service Provider, offers a wide range of ISP services including Business Uncapped Fibre, Wireless Connectivity, Hosted PBX for Business, and Managed Cloud Solutions. 

CipherWave’s sister company, Home-Connect specializes in Fibre to the Home and will be joining CipherWave at the conference. 

CipherWave and Home-Connect have invited some of their partners to join them at the conference and will be present at their stand. In keeping with experiencing the Internet, Cipherwave’s partners are key enablers of access and security services that ensures their customers are able to enjoy the best possible Internet experience both at home and at the office. Joining CipherWave and Home-Connect at the stand will be Securicom, a local security partner of CipherWave who specializes in FortiGate firewalls, email security and other managed security services. Also present at the stand will be Link Africa and Frogfoot, who are Fibre Network Operators with a growing national Fibre footprint covering both the residential and business Fibre space.

Whether you are in the office or at home, experience the excitement of the Internet at its best, with Super-Fast, Reliable and Uncapped Fibre from CipherWave and Home-Connect. Be sure to pass by and visit the CipherWave and Home-Connect stand at the MyBroadband Conference & Expo this year and stand a chance to win some spectacular trendy prizes. 

04 Sep 10 ways to protect your business from cyberattacks



One of the biggest threats businesses face in 2019 is cybercrime. There are many malicious parties online who are willing to take extreme measures to hack your business to steal your money, business information, or even the personal data of your staff and customers. For this reason, it is of critical importance to implement rigorous security measures to protect your business from these cybercriminals. Here are 10 ways you can protect your business from cyberattacks.

  1. Regularly change your passwords
Password security is a popular discussion point when it comes to online security, as weak passwords can be hacked and used to gain access to your business systems. What is less discussed, however, is the fact that changing your password regularly is an additional step that can improve your security substantially. This means that if a password is leaked, there is a good chance that it will no longer be useful by the time a malicious party tries to use it.

  1. Set clear administrative rights
Not everyone in your business needs to have access to all areas of your systems. By setting clear administrative rights for individual users, you can ensure that if an individual’s credentials are exposed, the hacker cannot access your entire business’ data. 

  1. Train your staff
When it comes to protecting your business, ensuring that your staff is knowledgeable on best security practices can be one of the most effective ways of upping your security. Many security breaches happen because individual users are not following efficient security measures on their individual devices, which can offer malicious parties access to your entire business network.

  1. Monitor your network
It’s one thing to implement strong security software on your network, but even the best software can have its flaws. It is therefore important that you actively monitor activity on your network, which will allow you to spot any issues that may crop up, and deal with them before they become bigger problems.

  1. Maintain your firewall
Firewalls are one of the most fundamental elements of digital security, so it is important that your firewall remains operationally optimised.

  1. Install email security software
Email security is another popular avenue for malicious parties to attempt to access important data. Phishing is a popular and efficient way to collect valuable data from unsuspecting users. To combat these and other email security threats, it is important to use powerful email security software, such as that from Mimecast.

  1. Keep your software updated
A common way that security systems are weakened is by failing to update your software. Out-of-date software is significantly more prone to being exploited by hackers, as it is often no longer supported by the developers.

  1. Encrypt and backup your data
How you store your data is a critical element of keeping it secure. It is crucial that you encrypt your data wherever it is stored so that it is not easily accessible to malicious parties. You should also backup all data so that if it is compromised, you can ensure business continuity.

  1. Have a disaster recovery plan
Sometimes disasters are unavoidable – but it is important that you have measures in place to deal with these disasters efficiently and timeously. This will save your business lots of money, as you will be able to minimise downtime and keep important systems running through the entire process.

  1. Check physical security
When one thinks about protecting your digital data, it’s easy to forget to ensure that your data is secure at a physical level. You should ensure that your data is stored at a location that is secure – ensuring that none of the storage devices your data is on can be stolen. It is also critical that the physical location of your data storage is not exposed to natural and man-made disasters such as flooding or fires.

CipherWave – Data protection as a service

CipherWave has partnered with a variety of leading data security companies to ensure that their data hosting, backup, and recovery services are highly reliable and efficient.

Recent additions to the stack of products that CipherWave uses for data storage include the likes of Mimecast and Fortigate – who offer leading email security and firewall products respectively.

20 Jun Cloud Computing: Your Next Move



Embracing any cloud solution isn’t something that ought to be managed without the slightest hesitation. If your business is considering deploying cloud-based services into your framework, you should know about the advantages the cloud can bring and which service provider will instrument the best overall results for your organisation.

Cloud computing allows us to access huge amounts of computing power by pooling resources in a fully virtualized manner. Instead of outlaying large amounts of capital expenditure on hardware infrastructure or a data centre, migrating to the cloud will allow you to transact with anything from applications to storage from a cloud service provider.

Any service which doesn’t require you to be physically close to the hardware that you are using can now be delivered via the cloud. It allows you to facilitate what is essentially a virtual office to give you the flexibility of connecting to your business from anywhere at any time. Your business can literally scale up or scale down your operation and storage needs quickly to suit your situation, allowing flexibility as your requirements evolve.

Whether you experience a natural disaster, power failures or other crises, having your data stored in the cloud ensures that it is backed up and protected in a secure and safe location.

Migrating to cloud-based solutions for your business is certain to offer a higher standard of security that your locally managed system is unlikely to achieve. Hacking techniques are becoming more effective every day, leaving  your systems and data compromised when only using a combination of a unique login ID and a complicated password. Cloud services encrypt all data and provide businesses with sophisticated tools for ease of management. 

Time is one of the most commonly tabled reasons as to why companies aren’t backing up their data. Cloud backup doesn’t require any additional time commitment as data and files are backed up to the cloud automatically and continuously or as scheduled upon migration. With a few clicks of the mouse, your backed up data can be easily found and restored.

To find out how the cloud can work for your business talk to CipherWave,

CipherWave is a South African Internet Service Provider (ISP) that provides growing businesses a range of solutions to help them connect, communicate and collaborate with their customers, employees and suppliers. We own and manage our own network infrastructure, which enables us to provide efficient, speedy service and support that our customers can count on 24/7.

Along with Iron Mountain, CipherWave is a sponsor at the 2019 MyBroadband Cloud Conference, which is taking place on 6 June at the Gallagher Convention Centre in Midrand. They will be showcasing their extensive cloud offering with special focus on their hybrid cloud capabilities. 

Iron Mountain Incorporated (NYSE: IRM), founded in 1951, is the global leader for storage and information management services. Trusted by more than 225,000 organisations  around the world, and with a real estate network of more than 85 million square feet across more than 1,400 facilities in over 50 countries, Iron Mountain stores and protects billions of valued assets, including critical business information, highly sensitive data, and cultural and historical artefacts.

Visit their stand and be entered into a draw to win a once-in-a-lifetime hot air balloon experience in the clouds for two.